CVE-2009-3625

Sahana 0.6.2.2 - Path Traversal via Mod Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3625. PoCs published by Greg Miernicki.

AI-analyzed exploit summary The provided text describes a local file disclosure vulnerability in Sahana 0.6.2.2 due to inadequate input validation. An attacker can exploit this by manipulating the 'stream' and 'mod' parameters to read arbitrary local files, such as '/etc/passwd'.

Description

Directory traversal vulnerability in www/index.php in Sahana 0.6.2.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Greg Miernicki · textwebappsphp
https://www.exploit-db.com/exploits/33308

The provided text describes a local file disclosure vulnerability in Sahana 0.6.2.2 due to inadequate input validation. An attacker can exploit this by manipulating the 'stream' and 'mod' parameters to read arbitrary local files, such as '/etc/passwd'.

Classification
Writeup 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: Sahana 0.6.2.2
No auth needed
Prerequisites: Access to the vulnerable Sahana application
devstral-2 · analyzed Feb 16, 2026 Full analysis →

Scores

EPSS 0.0575
EPSS Percentile 90.6%

Details

CWE
CWE-22
Status published
Products (1)
sahana/sahana 0.6.2.2
Published Oct 26, 2009
Tracked Since Feb 18, 2026